The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the possibility of hidden data. Since today all network services rely on the basic protocols, the use of data transmission capacities are not taken into account, untestable and redundant fields may become a big problem. All of the modern data protocols have vulnerabilities. An attacker can use the reserved fields or field use undocumented way. Regarding the mechanism of...
In this paper, we present a novel idea of multipath multicast, which is imperative to bandwidth intensive applications, in the context of multimedia streaming. In addition to congestion control, multipath TCP (MPTCP) has been proposed to establish multiple paths in a network to improve network reliability. Application-layer multicast (ALM) has been proposed to leverage end systems instead of dedicated...
A very common problem in the sensor networks area, where large numbers of sensors transmit data to a single sink node, is reliable transport. As sensors become cheaper and more powerful, sensor networks face the challenge of controlling all these devices in a efficient manner, which naturally leads to a sink-driven transport scheme. In this paper we propose RT-SENMOS, a sink-driven reliable transport...
Internet of Vehicles requires reliable Inter-Vehicular communications. Such a requirement is challenging since the wireless communication channel is very erroneous and lossy in city environments. A lot of solutions for connecting vehicles to the internet have been proposed. However, existing multi-hop gateway discovery solutions do not consider, a key issue, the unreliability of broadcast in city...
Tactical Edge Networks are one of the most challenging communication environments, where node mobility, constrained devices, and the wide use of wireless ad hoc channels for communications cause frequent link disruption and network partitioning. Additionally, applications running in Tactical Edge Networks often follow one-to-many and many-to-many communication models that require the nodes' cooperation...
The growth of data at an unprecedented rate poses challenge on its storage and analysis. To cope up with this, new machines are procured on a regular basis. On the other hand, a lot of computing resources in Institute labs, government offices etc. remain underutilized, since they are used for Internet and basic utilities. The aggregation of these underutilized resources can be more than handful to...
Communications Operations Procedure-1(COP-1) is widely used for reliable transmission of telecommand data for space missions. This paper focuses on the delay performance of COP-1 protocol over long and lossy link. The typical work conditions and process are studied combined with the characters of both the link and the transmission task. Based on the analysis of the procedure, the quantificational...
This paper investigates the strict reliable and timely requirements of the hard real traffic based control packets in the industrial control applications. As a result, a framework is proposed with two novel approaches intended to meet the strict deadline requirements and reliability requirements of the industrial control packets. The first novel approach, timed control panel incorporates timed token...
In Collaborative Virtual Environment (CVE) systems, one of the main research topics in is how to efficiently transmit message to minimized delay, provide scalability and reliability, and also the choice of transport protocol. TCP is the most widely used protocol in the design of CVE systems, and its throughput deteriorates in the network with large delay due to it conservative congestion control....
Rateless erasure code (REC) is an erasure code, where the encoder generates a potentially infinite number of encoded symbols and the original message can be reconstructed from a sufficient number of correctly received packets. Many REC-based transmission protocols have been proposed for improving network throughput in lossy channel. However, state-of-the-art RECs (such as LT code and Raptor code)...
A key property in tactical network environments is that the wireless network itself is typically the major limiting factor in how much information can be shared between users. In such environments, tactical operations often employ group communication protocols (one-to-many or many-to-many) to send information between users. This often results in situations where every message sent gets delivered to...
The software defined networking is attracting significant attention from business and private end-users. With characteristic of virtualization and programmability, Service Providers (SPs) can pay for the resources in the term of virtual data centers (VDCs) to deploy their services without maintaining expertise. Despite advantages the new paradigm brings, offering VDCs as a service still faces a new...
5G Networks are anticipated to provide a diverse set of services over Network Slices (NS) using Network Function Virtualization (NFV) technologies. We propose solutions to enable NS selection and routing of traffic routing through a NS. A framework for enabling negotiation, selection and assignment of NSs for requesting applications in 5G networks is presented. A definition for service description...
The paper deals with the aspects of implementation and validation of the SpaceWire-R protocol as carried out in the ESA-funded project SpaceR. We give a brief overview of the SpaceWire-R protocol for providing reliable data transfer services over SpaceWire networks and describe the SpW-R protocol software implementation elaborated in the SpaceR project. The testing platform developed for validation...
Smart grids are expected to increase efficiency, reliability and sustainability of future energy usage. Employing state-of-the-art information and communication technologies within power grids, is defining for smart grids; therefore interaction between energy grids and communication networks requires thorough study. Combined simulation of the behaviour of the electrical and communication network would...
Recently, cyber-attacks are increasingly targeting industrial control system facilities such as Stuxnet, Duke, and Flame. In order to protect these facilities from attacks, they separate industrial control systems from business network, and use a one-way data transmission technology for data transfer between each other systems. In this paper, we develop a unidirectional security gateway system, UNIWAY,...
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
Mobile ad-hoc networks (MANETs) are widely employed in many wireless networks, e.g. tactical area networks, due to its several advantages. Most of the MANETs must meet certain quality of service requirements such as high link reliability, low energy consumption and high throughput. However, major issues like interference dramatically degrade the service quality. In order to provide a high quality...
Portable smart devices have become popular in recent years. These devices also produce a large number of data. In wireless environment, it is important for portable devices to keep reliability of data transmission. While it is difficult to keep portable devices stable in a wireless environment. Instability of wireless path may cause unreachability between the server and devices. In this state, some...
In this paper, we propose a Controller Area Network with Flexible Data rate (CAN-FD) controller for communication network in automobile. The CAN FD is proper network protocol for in-vehicle and embedded communication which desires high reliability and data rate. We introduce our CAN FD controller which supports variable data length and faster data rate. The CAN FD controller receives data from virtual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.